Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

5 minutes with Tim Sulzer - The rise of gun violence and physical security technology

By Maria Henriquez
5 mins with
November 23, 2020

In today's ever changing environment, no organization and enterprise is immune from violence. Whether it is a church, movie theater, mall, or healthcare setting the need to plan for an act of violence, including active shooter events, is of paramount importance. 

And while public safety situational awareness and vigilance is an absolute must in our modern world, much thought has been given to how to develop plans, procedures, training and technology to stop these acts of violence. 

Here, we talk to Tim Sulzer, Chief Technology Officer (CTO) of ZeroEyes, about how physical security technology has evolved over the years to help make a difference in situations involving an active shooter or to reduce workplace and gun violence in various settings. 

 

Security magazine: What is your title and background, and what are your responsibilities?

Sulzer: I am the CTO and cofounder of ZeroEyes, an artificial intelligence (AI) weapons detection platform. In my role, I develop ZeroEyes’ technical roadmap and vision, ensure that we are continuously improving our machine learning algorithms in detecting visible guns to stop violent threats, and oversee our team of developers, engineers and other resources to align with our business goals. Prior to co-founding ZeroEyes, I was a multiple-time founder and startup advisor, and had experience developing various AI and computer vision-based solutions, including building a computer vision product to detect wildlife. 

 

Security magazine: Let’s discuss the rise of physical security technology. How have physical security technologies evolved within the last 15 years?

Sulzer: Technological advancements in physical security have increased in leaps and bounds over the last 15 years. Unfortunately, the demand for physical security solutions can be correlated to the exponential rise in violent threats - including mass shooting tragedies - which continue to increase in both number and severity. It’s a sobering reality that this year the U.S. has experienced a surge in gun violence, and such physical threats are an all-too-common occurrence across the country. 

Besides improvements in the quality of IP cameras, we’re seeing continual innovations and investments in a slew of technologies, including automated sensors, smart lighting, smart locks and keys, ID badging, emergency notification solutions and facial recognition. AI in particular has seen a significant impact in demand by organizations looking to leverage machine learning algorithms to quickly and accurately detect visible threats and take immediate action before any attacks occur. While even a few years ago there was a high degree of skepticism in deploying AI-based solutions due to potentially high rates of false positives (based on lighting, training the algorithm, etc), AI in particular has become more readily implemented and integrated into existing IP cameras. 

 

Security magazine: Gun violence has continued to escalate in the number and severity of threats, particularly in the last decade. What has that meant for how school campuses, commercial buildings and government sites have needed to rethink and improve their security protocols? 

Sulzer: For Chief Security Officers, Chief Risk Officers, security personnel and other physical security decision makers, the approach to securing buildings, campuses and government sites needs to be a multitiered approach involving people, processes and technologies and how they interplay with each other. 

Certainly, there’s been a level of security awareness and investments that would have been unheard of a decade ago. On school campuses, for example, we’re hearing from school administrators that they are becoming more knowledgeable about safety and security innovations,as this is a top priority, despite this being completely separate to their areas of expertise. It’s our job, however, as physical security technologists and innovators, to provide the underlying solutions that offer a duty of care to customers, but fundamentally detect and stop violent threats before they occur. 

 

Security magazine: To what extent has the COVID-19 pandemic added to the challenges of detecting and preventing active threats? 

Sulzer: At the onset of the pandemic as buildings were closed, this did delay pilots and installations we had scheduled. However, with gun violence continuing to take place in cities all across the U.S., in many instances this has actually hastened the push by security-minded professionals to assess their security protocols, and find ways to enhance them with the right processes, solutions and resources.

As many buildings gradually start to reopen since the pandemic, companies are increasingly looking past the COVID shutdown, and are taking advantage of this time with reduced onsite employees to upgrade infrastructure and pilot innovative new technologies.

 

Security magazine: What type of security resources and systems are companies currently investing in, and how do these installations play a component in their security strategies?

Sulzer: Based on our conversations with partners and customers, we’re seeing a number of technologies being assessed or implemented, which include access control, gunshot detection, AI and other analytics (including mask detecting AI), and other cloud services focused on providing greater flexibility and lower long-term operational and maintenance costs. 

For any physical security-minded organization, these technologies enhance situational awareness and extend the abilities of their team. These solutions should all be focused on providing security personnel and first responders with the real-time information needed to keep people safe. 

 

Security magazine: What advice do you have for security teams, and/or those in charge of putting policies in place to safeguard physical sites from threats?

Sulzer: Firstly, a multitiered security approach should be centered around your technology infrastructure. The better your technology stack, the less blindspots you have and the more effective your team is. Whether it’s by installing IP cameras, access control and locks that operate inside and outside a building in high traffic areas, to increasing sensor density or incorporating proactive AI solutions, technology can inform your policy decisions and be a force multiplier for an organization - particularly as people continue to work remotely and resources are constrained. 

Secondly, you should consider embracing cloud services with easy-to-upgrade edge sensors and infrastructure. The benefits of the cloud include greater flexibility, a wealth of integrations, and a cost-effective model that can serve as the backbone to your security environment.

Finally, it’s important to optimize your networks for throughput and security. Don’t leave performance on the table because of a component bottleneck, by doing things like continuing to assess vendors so that they are not a weak point in your network, as well as regularly testing your system and tweaking camera settings for best performance. 

KEYWORDS: active shooter gun violence public safety risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with peter george

    5 minutes with Peter George – The rise of physical security screening technology

    See More
  • 5 mins with Soroko

    5 minutes with Jason Soroko - The importance of zero trust during COVID-19

    See More
  • 5 minutes with Wiseman

    5 minutes with David Wiseman - Turning to technology for the distribution of COVID-19 vaccines

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!